EP1675032B1 - Vorrichtung, Verfahren und Computerprogrammprodukt zur Schätzung von Sicherheitsinformationen - Google Patents

Vorrichtung, Verfahren und Computerprogrammprodukt zur Schätzung von Sicherheitsinformationen Download PDF

Info

Publication number
EP1675032B1
EP1675032B1 EP05258023A EP05258023A EP1675032B1 EP 1675032 B1 EP1675032 B1 EP 1675032B1 EP 05258023 A EP05258023 A EP 05258023A EP 05258023 A EP05258023 A EP 05258023A EP 1675032 B1 EP1675032 B1 EP 1675032B1
Authority
EP
European Patent Office
Prior art keywords
information
security
text
stored
estimating
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Not-in-force
Application number
EP05258023A
Other languages
English (en)
French (fr)
Other versions
EP1675032A1 (de
Inventor
Atsuhisa Saitoh
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ricoh Co Ltd
Original Assignee
Ricoh Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ricoh Co Ltd filed Critical Ricoh Co Ltd
Publication of EP1675032A1 publication Critical patent/EP1675032A1/de
Application granted granted Critical
Publication of EP1675032B1 publication Critical patent/EP1675032B1/de
Not-in-force legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/105Multiple levels of security
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes

Definitions

  • the present invention relates to a security information estimating apparatus, a security information estimating method, a security information estimating program, and a recording medium thereof; and especially relates to a security information estimating apparatus, a security information estimating method, a security information estimating program, and a recording medium thereof for estimating security information of a document, that is the target of operations.
  • each document is associated with a list (ACL (Access Control List)) that defines kinds of accesses permitted by each user.
  • ACL Access Control List
  • the confidentiality of the document is obtained by a system based on the list ACL.
  • confidentiality may be secured inside the system that operates based on ACL, confidentiality cannot be maintained once the document is taken out of the system by a user who has a permission to access the document based on the ACL.
  • an XML (extensible Markup Language) document has a tag attribute that contains information about a group that has access permission, encryption, and a validity term. Thereby, the access control of the XML document is possible even if the XML document leaves (is taken out of) the system.
  • a document is converted to printable data and non-printable data, which are stored as being associated with the original document.
  • the non-printable data are provided; and when a request for printing is received, the printable data are provided to a printer, and the like. That is, an information leak is prevented from occurring by providing only data that are required, i.e., not providing data more than necessary.
  • Patent Reference 1 As described above, the conventional technologies such as disclosed by Patent Reference 1, Patent Reference 2, and Patent Reference 3 require certain information to be defined or set up by the user. That is, with the technology disclosed by Patent Reference 1, if ACL is not set up beforehand, access control is unrealizable. In the case of the technology disclosed by Patent Reference 2, if the information for access control is not added into the document, control cannot be performed. In the case of the technology disclosed by Patent Reference 3, unless the data according to the access permission are beforehand generated, control cannot be performed.
  • US-A-2002/087479 discloses a method and system for managing and securing digital information based on modular and abstract description.
  • US-A-2003/009526 discloses a method and apparatus for filtering messages.
  • the conventional technologies require the user to define security information, such as the access permission.
  • security information such as the access permission.
  • the access control is available only when the document is within the system, or only when there is information added by the system. Accordingly, access control is not available for a document for which the user definition is not assigned (unregistered document), nor for a document in which the security information is lacking.
  • the present invention provides a security information estimating apparatus, a security information estimating method, a security information estimating program, and a recording medium thereof for estimating security information of a document (operation target) that lacks of security information such that the document is properly protected, substantially obviating one or more of the problems caused by the limitations and disadvantages of the related art.
  • an embodiment of the invention provides a security information estimating apparatus, a security information estimating method, a security information estimating program, and a recording medium thereof for estimating security information of a document (operation target) as follows.
  • the invention is defined by a security information estimating apparatus as claimed in claim 1, a security information estimating method as claimed in claim 7 and a computer program product as claimed in claim 13.
  • security information estimating apparatus of the invention even if security information is not associated with a document, security information of another document that is similar to the target document is attached.
  • An embodiment of the present invention further provides a security information estimating method, a security information estimating program, and a recording medium that contains the security information estimating program for operating the security information estimating apparatus.
  • a security information estimating apparatus a security information estimating method, a security information estimating program, and a recording medium thereof that are capable of appropriately protecting information for which security information is not assigned are provided.
  • Fig. 1 shows an example of the structure of a security management system 1.
  • the security management system 1 includes a security attribute estimating server 10, a document server 20, and a mail server 30, all of which are connected by a network such as a LAN, either through a wired network, a wireless network or a combination thereof.
  • the security attribute estimating server 10, the document server 20, and the mail server 30 are installed in a corporation, an office, and the like within which informational confidentiality should be held.
  • the document server 20 constitutes a documentation management system with one or more clients (clients 22a, 22b, and so on), and contains an electronic document (“the document") that is uploaded by a client (such as the client 22a), and a document DB 21 that manages documents by associating various attribute values with the documents.
  • the document server 20 provides (uploads) a document and a value of its security attribute ("security attribute value") to the security attribute estimating server 10 at a predetermined interval or whenever a document is uploaded by a client such as the client 22a.
  • the security attribute concerns security management, such as an attribute used when controlling access to a document out of attributes of the document. While the configuration of the security attribute depends on the objective of protecting the documents, attributes that are often adequate include affiliation (one's post in the corporation, i.e., the management range of a manager), kinds of the document (personnel relation, accounting relation, a certain project relation, etc.), involving persons, involving group, secrecy level (top secret, confidential within a department, confidential within the corporation, and the like), secrecy maintenance term (date until which the secret should be kept), term of validity (date until which the document remains in force), preservation term (date until which the document should be preserved according to law).
  • affiliation one's post in the corporation, i.e., the management range of a manager
  • kinds of the document personnel relation, accounting relation, a certain project relation, etc.
  • involving persons involving group
  • secrecy level top secret, confidential within a department, confidential within the corporation, and the like
  • the access control of a document is determined by applying a security attribute value to a predetermined security policy.
  • the security attribute value is information that specifies security information
  • the security policy is equivalent to the security information.
  • the mail server 30 is a generic mail server for providing mail service to clients 31 and so on. In order to prevent an information leak from occurring, the mail server 30 provides text and an attached file of the mail requested by a client, such as the client 31, to the security attribute estimating server 10. The mail server 30 determines whether the mail is allowed to be delivered to the requesting client based on an estimated result of the security attribute value provided by the security attribute estimating server 10.
  • the security attribute estimating server 10 includes a text information DB 11 for storing text information extracted from a document provided by the document server 20 and the security attribute value of the document, compares the mail text and the attached file provided by the mail server 30 with the text information of each document stored in the text information DB 11 such that text information having contents that are the same as or similar to the contents of the mail text and the attached file is selected out of the text information stored, and based on the security attribute value of the selected document, a security attribute value of the mail text and the attached file is estimated.
  • the estimated security attribute value is provided to the mail server 30 as an estimated result. That is, the security information such as access permission of the mail text and the attached file is made equal to that of the similar document so that the mail text and the attached file are prevented from being unconditionally provided.
  • Fig. 2 shows an example of functional configuration of the security attribute estimating server 10.
  • the security attribute estimating server 10 includes the text information DB 11, a text information storing facility 12, and a security attribute estimating facility 13.
  • the text information storing facility 12 causes the text information DB 11 to store documents and security attribute values that are provided by the document server 20, and includes a data receiving unit 121, a text information extracting unit 122, a data storing unit 123, and a data transmitting unit 124.
  • the data receiving unit 121 is for receiving a document and its security attribute.
  • the text information extracting unit 122 is for extracting text information from the document.
  • a document may contain text and image information. Since,
  • the text information is compared, the text information has to be extracted from the document.
  • an existing text information extracting tool can be used. For example, if the document is readable by MS Word, text information can be extracted by reading the document, and by choosing "text document” as the file type for saving by MS Word. As another example, if the document is originated in MS PowerPoint, the document is first saved as "RTF" (Rich Text Format) after reading, and then saved as "text” using MS Word. Further, text information can be obtained from an Ichitaro document, a PDF document, and the like by using corresponding software.
  • the data storing unit 123 causes the text information DB 11 to store the text information of the document extracted by the text information extracting unit 122, and the security attribute value received by the data receiving unit 121, the text information being associated with the security attribute value.
  • the data transmitting unit 124 is for transmitting the processing result (the associated text information and the security attribute value) to the document server 20.
  • the security attribute estimating facility 13 is for estimating the security attribute value of the mail text and the attached file that are provided by the mail server 30 based on the information stored in the text information DB 11.
  • the security attribute estimating facility 13 includes a data receiving unit 131, a text information extracting unit 132, a similarity degree calculating unit 133, a data reading unit 134, a security attribute estimating unit 135, and a data transmitting unit 136.
  • the data receiving unit 131 is for receiving the mail text and the attached file from the mail server 30.
  • the text information extracting unit 132 is for extracting text information from the mail text and the attached file.
  • the similarity degree calculating unit 133 is for calculating a degree of similarity between "target text" (the text information extracted from the mail text and the attached file) and "stored text” (the text information stored in the text information DB 11) by comparing the target text and the stored text.
  • the data reading unit 134 is for reading the stored text from the text information DB 11 according to a request from the similarity degree calculating unit 133, and for reading the security attribute value from the text information DB 11 according to a request from the security attribute estimating unit 135.
  • the security attribute estimating unit 135 is for estimating the security attribute value to be applied to the target text (the mail text and the attached file) based on the degree of similarity calculated by the similarity degree calculating unit 133.
  • the data transmitting unit 136 is for providing the mail server 30 with the security attribute value to be applied to the target text based on the estimated result of the security attribute estimating unit 135.
  • the data receiving unit 121 and the data receiving unit 131 may be the same unit; and the data transmitting unit 124 and the data transmitting unit 136 may be the same unit.
  • data communications between the data receiving unit 121, the data transmitting unit 124, the data receiving unit 131, and data transmitting unit 136; that is, the data communications between the security attribute estimating server 10, the document server 20, and the mail server 30 may use HTTP (HxperText Transfer Protocol) and SOAP (Simple Object Access Protocol) based on XML.
  • HTTP HyperText Transfer Protocol
  • SOAP Simple Object Access Protocol
  • Fig. 3 shows an example of hardware configuration of the security attribute estimating server 10.
  • the security attribute estimating server 10 includes a drive apparatus 100, an auxiliary storage unit 102, a storage unit 103, a processing unit 104, and an interface device 105, all of which are connected by a bus B.
  • the program for operating the security attribute estimating server 10 is provided by a recording medium 101, such as a CD-ROM.
  • a recording medium 101 such as a CD-ROM.
  • the program is copied from the recording medium 101 and installed in the auxiliary storage unit 102 through the drive apparatus 100.
  • the auxiliary storage unit 102 stores a required file, required data, and so on in addition to storing the installed program.
  • the storage unit 103 reads the program from the auxiliary storage unit 102 and temporarily stores it, when a direction to start the program is provided.
  • the processing unit 104 performs functions for operating the security attribute estimating server 10 according to the program temporarily stored in the storage unit 103.
  • the interface device 105 is for interfacing to a network.
  • Fig. 4 is a sequence diagram for explaining the process when uploading a document and a security attribute value from the document server20.
  • Step S101 the document server 20 provides a document and its security attribute value to the security attribute estimating server 10.
  • Step S101 is performed as required, e.g., when a document is uploaded to the document server 20, when a document stored in the document DB 21 of the document server 20 is updated, and at a predetermined timing. Further, the number of the documents to be provided at this step is not restricted to one, but two or more documents and their corresponding security attribute values may be provided.
  • the data receiving unit 121 of the security attribute estimating server 10 receives the document and its security attribute value, outputs the document to the text information extracting unit 122 (S102), and outputs the security attribute value to the data storing unit 123 (S105).
  • the text information extracting unit 122 extracts text information from the document received (S103), and outputs the extracted text information of the document to the data storing unit 123 (S104).
  • the data storing unit 123 associates the text information received from the text information extracting unit 122 with the security attribute value received from the data receiving unit 121 (S106), and stores the text information and the associated security attribute value in the text information DB 11 (S107). Further, information indicating a process result (storing result), for example, normal termination or abnormal termination, is provided to the data transmitting unit 124 (S108). Then, the data transmitting unit 124 provides the storing result to the document server 20 (S109), and the process is finished.
  • a process result for example, normal termination or abnormal termination
  • the text information is beforehand extracted from the document stored in the document server 20, and is stored in the text information DB 11, the extracted text information of the document being associated with the security attribute value. For this reason, it is not necessary to read the document from the document server 20 and to extract the text information from the document every time the process of estimating a security attribute value (described below) is performed. Accordingly, the process of estimating security attribute value is accelerated.
  • the security attribute estimating server 10 estimates the security attribute value of the target text, which in this case is mail text and an attached file thereto provided by the mail server 30, based on the stored text and its security attribute value stored in the text information DB 11.
  • the mail text and the attached file that are provided by the mail server 30 serve as the target information on which the process is performed.
  • the mail server 30 provides the security attribute estimating server 10 with the mail text and the attached file thereto that are requested by the client 31 and a request for estimating (estimation request) the security attribute value thereof.
  • the estimation request (estimation request information 310) is shown in Fig. 6 , wherein the communications between the mail server 30 and the data receiving unit 131 are assumed to be performed in SOAP. Accordingly, information included in the estimation request is expressed in XML.
  • Fig. 6 does not show the SOAP message itself, but the information extracted from the SOAP message is shown.
  • the estimation request information 310 includes an "About” element 311 surrounded by ⁇ About> tags, a "MessageHeader” element 312 surrounded by ⁇ MessageHeader> tags, a "MessageBody” element 313 surrounded by ⁇ MessageBody> tags, and an "AttachedDocuments” element 314 surrounded by ⁇ AttachedDocuments> tags.
  • the About element 311 describes the outline of the estimation request, and includes an ID of the estimation request that is surrounded by ⁇ Id> tags, the name of the estimation request, i.e., "Estimation request of security attribute" that is surrounded by ⁇ Name> tags, the name of the maker of the estimation request, i.e., the host name of the mail server 30, that is surrounded by ⁇ Creator> tags, date and time when the estimation request is made that are surrounded by ⁇ DateTime> tags, and a description of the estimation request that is surrounded by ⁇ Description> tags.
  • the MessageHeader element 312 describes information about the header information of the mail. Therein, the address of the sender of the mail is surrounded by ⁇ From> tags, and the subject name of the mail is surrounded by ⁇ Subject> tags.
  • the MessageBody element 313 describes information about the mail text. Therein, an encoding type of the mail text is surrounded by ⁇ EncodeType> tags, the length of the mail text is surrounded by ⁇ length> tags, and the mail text is surrounded ⁇ body> tags.
  • the AttachedDocuments element 314 describes information about an attached file. Therein, the number of attached files is surrounded by ⁇ TotalCounts> tags, and an AttachedDocument element 3142 for every attached file is surrounded by ⁇ AttachedDocument> tags.
  • the AttachedDocument element 3142 includes ⁇ DocumentType> tags that surround the type of the attached file, ⁇ DocumentName> tags that surround the file name of the attached file, ⁇ Created> tags that surround date and time of creation of the attached file, ⁇ Modified> tags that surround date and time of modification to the attached file, ⁇ EncodeType> tags that surround the encoding type of the attached file, ⁇ length> tags that surround the length of the attached file, and ⁇ body> tags that surround the contents of the attached file.
  • the data receiving unit 131 of the security attribute estimating server 10 provides the mail text and the attached file received from the mail server 30 to the text information extracting unit 132.
  • the text information extracting unit 132 extracts text information from the mail text and the attached file (S123), and provides the extracted text information (target text) to the similarity degree calculating unit 133 (S124).
  • the similarity degree calculating unit 133 requests the data reading unit 134 to read the stored text of a document (S125)
  • the data reading unit 134 reads the stored text of one or more documents from the text information DB 11 (S126), and outputs the read stored text to the similarity degree calculating unit 133 (S127).
  • the similarity degree calculating unit 133 calculates the degree of similarity between the target text and the stored text of each document (S128), and outputs the calculated degree of similarity to the security attribute value estimating unit 135 (S129) Based on the degree of similarity, the security attribute estimating unit 135 selects a subset of text out of the stored text as "reference stored text" that is to be referenced when estimating the security attribute value of the target text, and requests the data reading unit 134 to read the security attribute value of the reference stored text (S130).
  • the number of the subsets of the reference stored text is not limited to one, but two or more subsets of reference stored text may be used as described belpw.
  • the data reading unit 134 reads the security attribute value that is associated with the reference stored text from the text information DB 11 (S131), and outputs the security attribute value to the security attribute estimating unit 135 (S132).
  • the security attribute estimating unit 135 estimates the security attribute value of the target text according to a predetermined method (estimating method) based on the read security attribute (S133). Then, the estimated security attribute value of the target text is provided to the data transmitting unit 136 (S134).
  • the data transmitting unit 136 provides the estimated security attribute value to the mail server 30 (S135), and this process is finished.
  • Fig. 7 shows estimated result information 320 serving as the estimated result of the security attribute value.
  • Fig. 7 does not show the SOAP message itself, but the information extracted from the SOAP message is shown, as is the case with Fig. 6 .
  • the estimated result information 320 includes an About element 321 surrounded by ⁇ About> tags, and a SecurityAttributes element 322 surrounded by ⁇ SecurityAttributes> tags.
  • the About element 321 is an element that describes the outline of the estimated result, and since its contents are the same as the About element 311 ( Fig. 6 ), the explanation is not repeated.
  • the SecurityAttributes element 322 provides information about the estimated security attribute value.
  • the SecurityAttributes element 322 includes the number of the SecurityAttribute elements (described below) that is surrounded by ⁇ TotalCounts> tags (3221), and one or more SecurityAttribute elements that are surrounded by corresponding ⁇ SecurityAttribute> tags (3222 and 3223).
  • Each of the SecurityAttribute elements 3222 and 3223 describes the security attribute value associated with corresponding reference stored text.
  • Each of the SecurityAttribute elements 3222 and 3223 includes document category of the reference stored text surrounded by ⁇ DocCategory> tags, secrecy level of the reference stored text surrounded by ⁇ DocLevel> tags, affiliation of the reference stored text surrounded by ⁇ manPost> tags a user ID and group ID of persons involved and persons concerned with the reference stored text, surrounded by ⁇ relPersons> tags, secrecy maintenance term of the reference stored text surrounded by ⁇ exhibitionDate> tags, storing term of the reference stored text surrounded by ⁇ eliminationDate> tags, and term of validity of the reference stored text surrounded by ⁇ expirationDate> tags.
  • the mail server 30 receives the estimated result information 320 as shown in Fig. 7 , and performs as follows based on the estimated security attribute value, namely:
  • the similarity degree calculating unit 133 can use various well-known technologies; e.g., the following method may be used.
  • the target text is divided into one or more blocks (key blocks). Then, it is determined whether each key block is included in the stored text.
  • the following methods for example, are conceivable,
  • each key block may be defined as including only a noun that is extracted from the target text by morphological analysis.
  • the degree of similarity is obtained by the following formula using determination results of the key blocks described above.
  • Si Degree of similarity to the i-th in the stored text
  • BF Number of key blocks extracted from the target text
  • WB j Number of characters of the j-th key block
  • BA ij Number of the j-th key blocks contained in the i-th document constituting the stored text
  • WAi Number of characters of the i-th document constituting the stored text
  • N Number of documents stored as the stored text in the text information DB 11.
  • methods of estimating the security attribute value by the security attribute estimating unit 135 include such as follows.
  • any one can be used; and any one can be selected for each security attribute.
  • the methods (2) and (3) are often desired.
  • the method (2) is often desired.
  • the affiliation, the type, the persons concerned, and the related group are to be considered, the methods (1) and (4) are often desirable.
  • GUI Graphic User Interface
  • Fig. 8 shows a display example of a security attribute estimating method setting screen 410, wherein a column 411 includes combo-boxes for the user to choose a security attribute to which an estimating method is to be assigned, a column 412 includes combo-boxes for the user to choose an estimating method, and a column 413 includes combo-boxes for the user to choose a definition of "Higher order”.
  • "Secrecy level" is selected at a combo-box 4111
  • "use attribute of No. 1" is selected at a combo-box 4121. That is, the estimating method of the secrecy level is defined such that the secrecy level of the stored text that has the greatest degree of similarity is used as the secrecy level of the target text.
  • a combo-box 4112 is clicked, then the security attribute estimating method setting screen 410 displays as shown in Fig. 9 .
  • Fig. 9 shows the security attribute estimating method setting screen 410, wherein a security attribute for which an estimating method is to be selected is being selected. If the combo-box 4112 is clicked, a pull-down list 4112a is displayed as shown in Fig. 9 .
  • the pull-down list 4112a shows security attributes, and one for which the estimating method is to be defined is selected from the list. For example, if "Secret maintenance term" is selected at the pull-down list 4112a, and a combo-box 4122 is clicked, the security attribute estimating method setting screen 410 appears as shown in Fig. 10 .
  • Fig. 10 shows the security attribute estimating method setting screen 410, wherein an estimating method is being selected. If a combo-box 4122 is clicked, a pull-down list 4122a is displayed as shown in Fig. 10 .
  • the pull-down list 4122a shows estimating methods, and the user is to select an estimating method from the list. If, for example, "The highest value of the attribute values of higher order" is selected at the pull-down list 4122a, and if a combo-box 4132 is clicked, the security attribute estimating method setting screen 410 appears as shown in Fig. 11 .
  • Fig. 11 shows the security attribute estimating method setting screen 410, wherein "The highest value of the attribute values of higher order" has selected; because the combo-box 4132 has been clicked, a pull-down list 4132a is displayed as shown in Fig. 11 , such that a definition of "Higher order” is selected.
  • the pull-down list 4132a provides choices of definitions of "Higher order”. If, for example, "10 highest order” is selected from the pull-down list 4132a, the greatest attribute value out of attribute values of ten documents in the stored text whose degrees of similarity are the greatest is selected as the attribute value of "Secret maintenance term".
  • the mail text and the attached file thereto that have no security information such as access permission are assigned the security information that is the same as that of the document having similar contents. Therefore, for example, when a mail with contents similar to the contents of a stored document is requested, suitable control is performed based on the security information of the stored document in addition to which a stored document can be posted with the suitable control.
  • the shared document is a document that is posted at a place that can be referenced by two or more persons for information sharing.
  • Fig. 12 shows an example of a security management system 2, The same reference numbers are given to the same portions as Fig. 1 , and the explanations thereof are not repeated.
  • the security management system 2 in Fig. 12 includes a share server 40 in addition to the security management system 1 shown in Fig. 1 .
  • the share server 40 is for providing a shared document uploaded from a client such as a client 41 to a network.
  • the share server 40 makes the shared document available to the network by placing the shared document at a share folder.
  • Fig. 13 shows an example of a functional configuration of the security attribute estimating server 10.
  • the security attribute estimating facility 13 of the security attribute estimating server 10 shown in Fig. 13 includes a data collecting unit 137 instead of the data receiving unit 131 of Fig. 2 .
  • the data collecting unit 137 is for collecting shared documents in the security attribute estimating server 10.
  • the security attribute estimating server 10 includes the text information storing facility 12 that is the same as shown in Fig. 2 , illustration of which in Fig. 13 is omitted.
  • Fig. 14 is a sequence diagram of the process of estimating the security attribute value of target information.
  • the shared document collected from the share server 40 represents the target information.
  • the data collecting unit 137 of the security attribute estimating server 10 requests a shared document by accessing the share folder of the share server 40, and acquires the same (S202).
  • the data collecting process of shared documents may be performed as desired, e.g., periodically at a predetermined interval, and when detecting a shared document being uploaded from a client such as the client 41 to the share server 40. If the data collecting process is to be periodically performed, it is desirable that the predetermined period be as short as possible so that a period during which a document that should not be published is available as a shared document is made as short as possible.
  • the data collecting unit 137 provides the acquired shared document to the text information extracting unit 132 (S203).
  • Steps S204 through S215 are the same as steps S123 through S135, whereby the text information is extracted (target text) from the shared document, the degree of similarity of the text information (target text) is determined with reference to each document in the stored text, the security attribute value of the shared document is estimated, and so on.
  • a result of the estimation is provided to the mail server 30 (S216).
  • the mail server 30 having received the estimated result may leave the handling of the shared document to the manager by transmitting a mail that includes the estimated result to the manager.
  • the manager can control the shared document such as deleting it from the share server 40.
  • the estimated result may be provided to the share server 40.
  • the share server 40 is capable of receiving access privilege information of a document that has a security attribute value based on the estimated security attribute value, determining access permission, automatically deleting a shared document based on the determination, and saving the shared document with an associated log being generated.
  • the share server 40 may perform any one of or any combination of these functions.
  • logon to the share server 40 is required before accessing the share folder at Step S201 from the data collecting unit 137. Specifically, the logon is carried out by a domain user or a user with permission to access the share server 40. Practically, in a network of a corporation, wherein domain management is carried out, it is general practice that a domain manager logs on with its authority.
  • the security attribute estimating server 10 acquires a list of the share servers 40 by sending a "broadcast" to the network such that a share folder is located, and then requests the list of share folders (for which access permission has been obtained) of each share server 40. Then, a folder with access permission is monitored; when a folder is newly created, a shared document is created by uploading, and so on, such activities are detected. When it is detected that a shared document is created, the security attribute estimating server 10 acquires a copy thereof.
  • a shared document, to which no security information, such as access permission, is assigned can be provided with security information that is the same as the similar stored document.
  • security information of the similar document in the stored text is assigned, providing appropriate control of the document in addition to the appropriate control being provided to the stored document based on the security information assigned to the stored document.
  • the share server 40 does not have to be a mere file server, but it can be, e.g., a FTP (File Transfer Protocol) server, a Web server, and the like that publishes information on the Internet. In this case, the danger of information being leaked all over the world through the Internet can be effectively prevented from occurring.
  • FTP File Transfer Protocol
  • a security management system 3 according to an Embodiment of the present invention is described, wherein the security attribute value of image data is estimated, the image data being scanned by such as a scanner, a copying machine, and a multifunctional machine.
  • Fig. 15 shows a structure example of the security management system 3.
  • the same reference numbers are given to the same portions as Fig.1 , and the explanations thereof are not repeated.
  • the security management system 3 of Fig. 15 includes a multifunctional machine 50 in place of the mail server 30 shown in Fig. 1 .
  • the multifunctional machine 50 is a device that functions as a printer, a FAX, a copy, and a scanner in one entity. However, all the functions are not required for the purpose of the present embodiment, but the multifunctional machine may be of any one function.
  • Fig. 16 shows an example of functional configuration of the security attribute estimating server 10 according to an Embodiment of the present invention.
  • the same reference numbers are given to the same portion as Fig. 2 , and the explanations thereof are not repeated.
  • the configuration shown in Fig. 16 is the same as that of Fig. 2 .
  • the data that the data receiving unit 131 receives according to the Embodiment are image data.
  • the process of uploading a document and security information from the document server 20 is the same as that shown in Fig. 4 .
  • the process of estimating a security attribute value is described.
  • Fig. 17 is a sequence diagram for estimating the security attribute value of target information according to an illustratrial example.
  • the target information is the image data provided by the multifunctional machine 50.
  • the multifunctional machine 50 provides a request for estimating the security attribute value of the image data to the data receiving unit 131 of the security attribute estimating server 10 with the image data obtained by scanning.
  • the image data may be provided in sync with scanning, or alternatively, at a predetermined interval in consideration of the image data being stored to some extent; further, two or more sets of image data may be provided at a predetermined interval.
  • the data receiving unit 131 receives the image data and outputs the image data to the text information extracting unit 132 (S302). Henceforth, at steps S315 through S303, extraction of text information from the image data, calculation of the degree of similarity between the extracted text information (target text) and each document in the stored text, estimating of the security attribute value of the image data, and so on are performed as at the steps S123 through S135, and an estimated result is provided to the multifunctional machine 50.
  • the multifunctional machine 50 receives the estimated result, and based on the estimated security attribute value, receives access privilege information of a document that has the security attribute value, and autonomously determines access permission; or alternatively, notifies the documentation manager of the estimated result, and controls the process of copying and scanning demand using a response from the manager. For example, the image data that are scanned may be deleted, copying may be stopped, the image data may be provided to the manager, the image data may be saved being associated with a log, warning may be provided to the manager, and warning may be displayed on a control panel. Any one of above functions or any combination thereof may be performed.
  • extraction of the text information from the image data at step S303 can be carried out using an OCR (Optical Character Recognition) technology that is generally available.
  • OCR Optical Character Recognition
  • the degree of similarity may contain errors, the degree of similarity being calculated by comparing the target text extracted by OCR with the stored text that is extracted from a document that is prepared by, e.g., word-processing software and stored.
  • the process of uploading the document and security information from the document server 20 according to the present invention is arranged as shown in Fig. 18 , which is called the second uploading method.
  • Fig. 18 is a sequence diagram for explaining the uploading method of uploading the document and security attribute value from the document server 20 according to the present invention.
  • the same reference numbers are given to the same steps as Fig. 4 , and the explanations thereof are not repeated.
  • step S103 1 and S103-2 are added. That is, the text information extracting unit 122 generates false print data (raster data) based on the document received from the data receiving unit 121 (S103-1), and extracts text information from the false print data using OCR (S103-2).
  • false print data raster data
  • OCR OCR
  • two sets of text information i.e., one extracted at step S103, and the other extracted at step S103-2, are present. Both sets are stored in the text information DB 11 with a security attribute value being associated therewith.
  • the OCR engine used at step S103-2 is desirably the same as the OCR engine used at S303 of Fig. 17 for extracting the text information from the image data received from the multifunctional machine 50. This is because, if both are the same, the probability of the text information acquired as a result of incorrect recognition being the same is high; and the probability of obtaining reasonable values in calculation of the degree of similarity of the text information acquired from each text information set is high.
  • image data, to which security information such as access permission, has not been assigned are assigned security information that is the same as that of a similar stored document.
  • security information such as access permission
  • the document provided by the document server 20 of the security attribute estimating server 10 is described as being stored as text information, the document may be stored as image information. Hereafter, this case is described.
  • Fig. 19 shows an example of a security management system 4.
  • the security attribute estimating server 10 includes an image information DB 14 instead of the text information DB 11.
  • the image information DB 14 is a database that stores the image information generated based on the document provided by the document server 20, and the security attribute value that is associated with the document.
  • Fig. 20 shows an example of functional configuration of the security attribute estimating server 10.
  • the security attribute estimating server 10 of Fig. 20 has an image information storing facility 15.
  • the image information storing facility 15 corresponds to the text information storing facility 12 ( Fig. 2 ), and includes a data receiving unit 151, an image information forming unit 152, a data storing unit 153, and a data transmitting unit 154.
  • the data receiving unit 151, the data storing unit 153, and the data transmitting unit 154 function like the data receiving unit 121, the data storing unit 123, and the data transmitting unit 124, respectively, of the text information storing facility 12.
  • the image information forming unit 152 is for generating image information based on a document. Specifically, the image information forming unit 152 performs an image formation process of an image (image information), the same process as performed by a printer, and the like. While it may be ideal that image information forming units 152 be prepared for all conceivable printing apparatuses to which the document can be output, practically, the image information forming units 152 are prepared for typical printers (laser, ink jet, etc.) of typical makers.
  • the security attribute estimating facility 13 in Fig. 20 does not include the text information extracting unit 132 that is included in the security attribute estimating facility 13 in Fig. 16 . This is because, image data are compared, and it is not necessary to extract text information from an image provided by the multifunctional machine 50.
  • Fig. 21 is a sequence diagram for explaining the process when uploading a document and security attribute value from the document server.
  • Steps S401, S402, and S405 are almost the same as Steps S101, 5102, and S105 in Fig. 4 . That is, the document and its security attribute value provided by the document server 20 are received by the data receiving unit 151. Then, the document is provided to the image information forming unit 152 (S402), and the security attribute value is provided to the data storing unit 153 (S405),
  • the image information forming unit 152 receives the document, generates image information of the document (S403), and outputs the generated image information to the data storing unit 153 (S404).
  • the data storing unit 153 associates the image information received from the image information forming unit 152 with the security attribute value received from the data receiving unit 151 (S406), and stores them in the image information DB 14 (S407).
  • Information indicating a result of the process is provided to the data transmitting unit 154 (S408). Then, the data transmitting unit 154 provides the storing result to the document server 20, and this process is finished.
  • Fig. 22 is a sequence diagram of the process of estimating the security attribute value of the target information.
  • the image data provided from the multifunctional machine 50 is the target of the following operational process.
  • the multifunctional machine 50 provides the image data that are obtaining by scanning to the data receiving unit 131 of the security attribute estimating server 10, requesting an estimation of the security attribute value of the image data.
  • the transmission of image data may be carried out every time the image data are scanned, every time a predetermined number of sets of image data are collected, or at a predetermined interval.
  • Fig. 23 shows information provided as a request to estimate the security attribute value of the image data.
  • Fig. 23 shows the case wherein communications between the multifunctional machine 50 and the data receiving unit 131 are based on SOAP. Accordingly, the information included in tha estimation request of a security attribute value is expressed in XML.
  • Fig. 23 shows not the SOAP message itself, but the information extracted from the SOAP message.
  • the estimation request information 330 includes an About element 331 surrounded by ⁇ About> tags, an ImageType element 332 surrounded by ⁇ ImageType> tags, and an ImageBody element 333 surrounded by ⁇ ImageBody> tags.
  • the About element 331 outlines a result of estimation. Since the contents of the About element 331 are the same as the About element 311 ( Fig. 6 ), the explanation is not repeated.
  • the ImageType element 332 is for describing the classification (TIFF) of the image data.
  • the ImageBody element 333 is for describing information about the contents of the image data, wherein the kind of encoding of the image data is surrounded by ⁇ EncodeType> tags, the length of the image data is surrounded by ⁇ length> tags, and the encoded image data are surrounded ⁇ body> tags.
  • Step S422 the process progresses to Step S422, where the data receiving unit 131 provides the received image data (target image) to the similarity degree calculating unit 133. Then, the similarity degree calculating unit 133 requests the data reading unit 134 to read stored image information (S423). Then, the data reading unit 134 reads a part or all of the stored image information from the image information DB 14 (S424), and provides the read image data to the similarity degree calculating unit 133 (S425).
  • the similarity degree calculating unit 133 calculates the degree of similarity between the target image and each set of the stored image information (S426), and outputs a calculated degree of similarity to the security attribute estimating unit 135 (S427). Based on the degree of similarity, the security attribute estimating unit 135 selects a set of image information out of the stored image information, the set of image information serving as a reference ("reference stored image information") for estimating the security attribute value of the target image, and requests the data reading unit 134 to read the security attribute value of the reference stored image information (S428).
  • the number of sets of reference stored image information is not limited to one, but can be two or greater.
  • the data reading unit 134 reads the security attribute value of the reference stored image information from the image information DB 14 (S429), and outputs to the security attribute estimating unit 135 (S430).
  • the security attribute estimating unit 135 estimates the security attribute value of the target image based on the read security attribute value according to the estimating method described above (S431), and outputs the security attribute value of the target image as the estimated result to the data transmitting unit 136 (S432).
  • the data transmitting unit 136 provides the estimated security attribute value to the multifunctional machine 50 (S433), and the process is finished.
  • the multifunctional machine 50 receives the estimated result, and based on the estimated security attribute value, receives access privilege information of a document that has the security attribute value, and autonomously determines an access permission; or alternatively, notifies the documentation manager of the estimated result, and controls the process of copying and scanning request using a response from the manager. For example, the image data obtained by scanning may be deleted, copying may be stopped, scanning data may be provided to the manager, scanning data may be saved being associated with a log, warning may be provided to the manager, and warning may be displayed on a control panel. Any one or any combination of the functions described above may be performed as desired.
  • calculation of the degree of similarity by the similarity degree calculating unit 133 at step S426 may be performed by using various publicly available methods.
  • a commercial product that measures the amount of features in a real space such as VISMeister (http://www.ricoh.co.p/vismeister/) may be used.
  • the degree of similarity can be obtained by extracting frequency components of the image information using orthogonal transformation, such as a discrete Fourier transform and a discrete cosine transform, obtaining an average square error (0 through 1), and deducting the average square error from 1.
  • the security management system 4 even when a document provided by the document server 20 is stored in the security attribute estimating server 10 as image information, the same effect as the security management system 3 of the present invention is obtained.
  • Fig. 24 shows an example of a security management system 5.
  • the security attribute estimating server 10 of the security management system 5 shown in Fig. 24 includes the image information DB 14 instead of the text information DB 11.
  • Fig. 25 shows an example of functional configuration of the security attribute estimating server 10.
  • the security attribute estimating facility 13 of the security attribute estimating server 10 shown in Fig. 25 includes an image information forming unit 138.
  • the image information forming unit 138 has the same function as the image information forming unit 152 of the image information storing facility 15, and generates image information based on the document acquired from the share server 40.
  • the security attribute estimating server 10 includes the image information storing facility 15 that is the same as the image information storing facility 15 shown in Fig. 20 , and illustration thereof is omitted in Fig. 25 .
  • the uploading process for uploading a document and security information from the document server 20 is the same as shown in Fig. 21 .
  • a process of estimating the security attribute value is described
  • Fig. 26 is a sequence diagram for explaining the estimation process of the security attribute value of the target information.
  • the shared document collected from the share server 40 serves as the target information
  • a shared document is acquired from the share server 40 by the data collecting unit 137 as in Steps S201 and S202 of Fig. 14 .
  • the data collecting unit 137 outputs the acquired shared document to the image information forming unit 138 (S503).
  • the image information forming unit 138 that receives the shared document generates the image information of the shared document (S504), and outputs the generated image information to the similarity degree calculating unit 133 (S505).
  • steps S506 through S515 calculation of the degree of similarity between the target image and the stored image information, estimating of the security attribute value of the shared document, and so on are performed as Steps S423 through S432 in Fig. 22 , and an estimated result is provided to the data transmitting unit 137.
  • the data transmitting unit 137 provides the estimated result to the mail server 30 (S516) and/or the share server 40 (S517) as required.
  • the mail server 30 or the share server 40 can control operations of the shared document by the process that is the same as described above.
  • the same effect as the security management system 2 can be acquired, even when the document of the document server 20 is stored in the security attribute estimating server 10 as image information.
  • the target information does not have to be a shared file in the share server 40, but can be mail text and attached file provided by the mail server 30.
  • the security attribute estimating server 10 receives the mail text and attached file from the mail server 30, with subsequent process being as described in Fig. 26 .
  • the security attribute estimating server 10 does not need to include the image information forming unit 152 in the image information storing facility 15, and can use the image data received from the image information DB 14 as they are.
  • the text information DB 11 and the image information DB 14 employed not exclusive, i.e., both can be employed by the security attribute estimating server 10.
  • either or both of text information and image information may be stored for every document received from the document server 20 according to a predetermined rule. For example, if the rate of text information extracted from a document is greater than a predetermined threshold, the extracted text information is stored in the text information DB 11. To the contrary, if the rate of the text information extracted from the document is smaller than the predetermined threshold, image information is generated based on the document, and the image information is stored in the image information DB 14.
  • the security management system can be constituted with one of a general purpose computer, a scanner, a copy machine, a multifunctional machine, and the like.
  • the security attribute value serves as information that specifies security information.
  • the information that specifies the security information may be a document ID, for example. This is because security information of a document can be specified based on the document ID.
  • the security attribute estimating server 10 can be configured such that it determines whether an operation on the document is permitted, and provides a result of the determination, in addition to determining the security attribute value of the target information.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Bioethics (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Storage Device Security (AREA)
  • Information Transfer Between Computers (AREA)

Claims (13)

  1. Sicherheitsinformationen-Ermittlungsvorrichtung (1) zum Ermitteln von Sicherheitsinformationen, die auf Zielinformationen anwendbar sind, die Vorrichtung umfassend:
    eine Speicherinformationen-Erfassungseinheit (134) zum Erfassen gespeicherter Informationen, denen die Sicherheitsinformationen zugeordnet sind;
    eine Zielinformationen-Erfassungseinheit (131) zum Erfassen der Zielinformationen in der Form von gescannten Bilddaten;
    eine Ähnlichkeitsbestimmungseinheit (133) zum Bestimmen eines Ähnlichkeitsgrads zwischen den gespeicherten Informationen und den Zielinformationen; und
    eine Sicherheitsinformationen-Ausgabeeinheit (135) zum Auswählen der gespeicherten Informationen, deren Sicherheitsinformationen auf die Zielinformationen anzuwenden sind, basierend auf dem Ähnlichkeitsgrad, und zum Ausgeben eines der Sicherheitsinformationen und von Informationen, die die Sicherheitsinformationen spezifizieren können,
    gekennzeichnet durch eine Textinformationen-Extraktionseinheit (122), die angeordnet ist, um falsche Druckdaten basierend auf den gespeicherten Informationen zu erzeugen und um zweite Textinformationen durch Durchführen von Zeichenerkennumg an den falschen Druckdaten zu erzeugen, und dadurch, dass die Ähnlichkeitsbestimmungseinheit (133) den Ähnlichkeitsgrad zwischen Textinformationen, die auf den zweiten Textinformationen basieren, und Textinformationen, die auf Durchführen einer OCR-Operation an den Zielinformationen basieren, bestimmt und die ausgegebenen Sicherheitsinformationen an einen Scanner, ein Kopiergerät oder Multifunktionsgerät ausgegeben werden, der/das automatisch Zugangsgenehmigung für die Zielinformationen bestimmt.
  2. Sicherheitsinformationen-Ermittlungsvorrichtung (1) nach Anspruch 1, wobei die falsche Druckdaten Rasterdaten sind.
  3. Sicherheitsinformationen-Ermittlungsvorrichtung (1) nach Anspruch 1 oder 2, gekennzeichnet durch:
    eine Textinformationen-Speichereinrichtung (12) zum Speichern der Textinformationen, die auf den gespeicherten Informationen basieren; und dadurch gekennzeichnet, dass
    die Ähnlichkeitsbestimmungseinheit (135) den Ähnlichkeitsgrad zwischen den Textinformationen, die in der Textinformationen-Speichereinrichtung gespeichert sind, und den Textinformationen, die auf den Zielinformationen basieren, bestimmt.
  4. Sicherheitsinformationen-Ermittlungsvorrichtung (1) nach einem der Ansprüche 1, 2 oder 3, dadurch gekennzeichnet, dass
    die Speicherinformationen-Erfassungseinheit (134) die gespeicherten Informationen und eines der Sicherheitsinformationen und der Informationen, die die Sicherheitsinformationen spezifizieren können, erfasst, und
    die Textinformationen-Speichereinrichtung die Textinformationen, die auf den gespeicherten Informationen basieren, und eines der Sicherheitsinformationen und der Informationen, die die Sicherheitsinformationen spezifizieren können, speichert, wobei die Textinformationen und die Sicherheitsinformationen miteinander assoziiert sind.
  5. Sicherheitsinformationen-Ermittlungsvorrichtung nach einem der Ansprüche 1 bis 4, dadurch gekennzeichnet, dass
    die Speicherinformationen-Erfassungseinheit (134) die gespeicherten Informationen und eines der Sicherheitsinformationen und der Informationen, die die Sicherheitsinformationen spezifizieren könne, erfasst, und
    die Bildinformationen-Speichereinrichtung die Bildinformationen, die auf den gespeicherten Informationen basieren, und eines der Sicherheitsinformationen und der Informationen, die die Sicherheitsinformationen spezifizieren können, speichert, wobei die Bildinformationen und eines der Sicherheitsinformationen und der Informationen, die die Sicherheitsinformationen spezifizieren können, miteinander assoziiert sind.
  6. Sicherheitsinformationen-Ermittlungsvorrichtung nach einem der Ansprüche 1 bis 5, dadurch gekennzeichnet, dass
    die Informationen, die die Sicherheitsinformationen spezifizieren, ein Attributwert eines im Voraus bestimmten Attributs sind, das den gespeicherten Informationen zugeordnet ist.
  7. Sicherheitsinformationen-Ermittlungsverfahren zum Ermitteln von Sicherheitsinformationen von Zielinformationen unter Verwendung eines Computers, das Verfahren umfassend:
    einen Speicherinformationen-Erfassungsprozess (S126) zum Erfassen gespeicherter Informationen, denen Sicherheitsinformationen zugeordnet sind;
    einen Zielinformationen-Erfassungsprozess (S124) zum Erfassen von Zielinformationen in der Form von gescannten Bilddaten;
    einen Ähnlichkeitsgrad-Bestimmungsprozess (S128) zum Bestimmen eines Ähnlichkeitsgrads zwischen den gespeicherten Informationen und den Zielinformationen; und
    einen Sicherheitsinformationen-Ausgabeprozess zum
    Auswählen gespeicherter Informationen (S133), deren Sicherheitsinformationen auf die Zielinformationen anzuwenden sind, basierend auf dem Ähnlichkeitsgrad, und
    Ausgeben eines der Sicherheitsinformationen und von Informationen, die die Sicherheitsinformationen spezifizieren (S134/S135),
    gekennzeichnet durch:
    Erzeugen falscher Druckdaten basierend auf den gespeicherten Informationen,
    Erzeugen zweiter Textinformationen durch Durchführen von Zeichenerkennung an den falschen Druckdaten, und
    Bestinunen des Ähnlichkeitsgrads zwischen Textinformationen, die auf den zweiten Textinformationen basieren, und Textinformationen, die auf Durchführen einer OCR-Operation an den Zielinformationen basieren, und wobei die ausgegebenen Sicherheitsinformationen an einen Scanner, ein Kopiergerät oder Multifunktionsgerät ausgegeben werden, der/das automatisch Zugangsgenehmigung für die Zielinformationen bestimmt.
  8. Sicherheitsinformationen-Ermittlungsverfahren nach Anspruch 7, wobei die falschen Druckdaten Rasterdaten sind.
  9. Sicherheitsinformationen-Ermittlungsverfahren nach Anspruch 7 oder 8, gekennzeichnet durch:
    einen Textinformationen-Speicherprozess (S107) zum Speichern von Textinformationen, die auf den gespeicherten Informationen basieren; und dadurch gekennzeichnet, dass
    der Ähnlichkeitsgrad-Bestimmungsprozess den Ähnlichkeitsgrad zwischen den Textinformationen, die durch den Textinformationen-Speicherprozess gespeichert wurden, und den Textinformationen, die auf den Zielinformationen basieren, bestimmt.
  10. Sicherheitsinformationen-Ermittlungsverfahren nach Anspruch 7, 8 oder 9, dadurch gekennzeichnet, dass
    der Speicherinformationen-Erfassungsprozess die gespeicherten Informationen und eines der Sicherheitsinformationen davon und der Informationen, die die Sicherheitsinformationen spezifizieren, erfasst, und
    der Textinformationen-Speicherprozess die Textinformationen, die auf den gespeicherten Informationen basieren, und eines der Sicherheitsinformationen und der Informationen, die die Sicherheitsinformationen spezifizieren, speichert, wobei die Textinformationen und eines der Sicherheitsinformationen und der Informationen, die die Sicherheitsinformationen spezifizieren, miteinander assoziiert sind.
  11. Sicherbeitsinformationen-Ermittlungsverfahren nach einem der Ansprüche 7 bis 10, dadurch gekennzeichnet, dass
    der Speicherinformationen-Erfassungsprozess die gespeicherten Informationen und eines der Sicherheitsinformationen davon und der Informationen, die die Sicherheitsinformationen spezifizieren, erfasst, und
    der Bildinformationen-Speicherprozess die Bildinformationen, die auf den gespeicherten Informationen basieren, und eines der Sicherheitsinformationen davon und der Informationen, die die Sicherheitsinformationen spezifizieren, speichert, wobei die Bildinformationen und eines der Sicherheitsinformationen davon und der Informationen, die die Sicherheitsinformationen spezifizieren, miteinander assoziiert sind.
  12. Sicherheitsinformationen-Ermittlungsverfahren nach einem der Ansprüche 7 bis 11, dadurch gekennzeichnet, dass
    die Informationen, die die Sicherheitsinformationen spezifizieren, ein Attributwert eines im Voraus bestimmten Attributs der gespeicherten Informationen sind.
  13. Computerprogrammprodukt, umfassend ein computerlesbares Aufzeichnungsmedium, das darin eine Vielzahl von Befehlen für ein Sicherheitsinformationen-Ermittlungsprogramm speichert, wobei die Befehle bewirken, dass ein Computer das Verfahren nach einem der Ansprüche 7 bis 12 ausführt.
EP05258023A 2004-12-27 2005-12-23 Vorrichtung, Verfahren und Computerprogrammprodukt zur Schätzung von Sicherheitsinformationen Not-in-force EP1675032B1 (de)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
JP2004377748A JP4695388B2 (ja) 2004-12-27 2004-12-27 セキュリティ情報推定装置、セキュリティ情報推定方法、セキュリティ情報推定プログラム及び記録媒体

Publications (2)

Publication Number Publication Date
EP1675032A1 EP1675032A1 (de) 2006-06-28
EP1675032B1 true EP1675032B1 (de) 2011-02-09

Family

ID=36088226

Family Applications (1)

Application Number Title Priority Date Filing Date
EP05258023A Not-in-force EP1675032B1 (de) 2004-12-27 2005-12-23 Vorrichtung, Verfahren und Computerprogrammprodukt zur Schätzung von Sicherheitsinformationen

Country Status (4)

Country Link
US (1) US20060168659A1 (de)
EP (1) EP1675032B1 (de)
JP (1) JP4695388B2 (de)
DE (1) DE602005026249D1 (de)

Families Citing this family (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4579718B2 (ja) * 2005-03-01 2010-11-10 株式会社エヌ・ティ・ティ・ドコモ 情報送信システム、及び情報送信方法
JP4158927B2 (ja) 2005-03-25 2008-10-01 インターナショナル・ビジネス・マシーンズ・コーポレーション 情報提示装置、情報提示方法、プログラム
JP2008027235A (ja) * 2006-07-21 2008-02-07 Ricoh Co Ltd 情報処理装置、情報処理方法および情報処理プログラム
JP5014089B2 (ja) * 2007-11-28 2012-08-29 株式会社リコー 電子文書監査方法及び電子文書監査装置
JP4666065B2 (ja) * 2008-12-03 2011-04-06 富士ゼロックス株式会社 情報処理装置及びプログラム
JP4949368B2 (ja) * 2008-12-24 2012-06-06 日本電信電話株式会社 機密情報管理システムおよび機密情報管理方法
JP5402387B2 (ja) 2009-08-17 2014-01-29 富士ゼロックス株式会社 ファクシミリ装置、情報処理装置、プログラム
JP2011123740A (ja) * 2009-12-11 2011-06-23 Fujifilm Corp 閲覧システム、サーバ、テキスト抽出方法及びプログラム
JP2011170510A (ja) * 2010-02-17 2011-09-01 Nec Corp 自動ファイル管理装置、自動ファイル管理システム、自動ファイル管理方法及び自動ファイル管理プログラム
JP2011170509A (ja) * 2010-02-17 2011-09-01 Nec Corp 機密度学習装置、機密度学習システム、機密度学習方法および機密度学習プログラム
JP5718630B2 (ja) * 2010-12-21 2015-05-13 キヤノンマーケティングジャパン株式会社 情報処理装置、情報資産管理システム、情報資産管理方法、及びプログラム
JP2012164090A (ja) * 2011-02-04 2012-08-30 Fujitsu Ltd データ移動制御方法、制御装置、データ移動制御プログラムおよびデータ移動制御システム
JP2013114383A (ja) * 2011-11-28 2013-06-10 Denso Corp プライバシー保護方法、車両用装置、車両用通信システムおよび携帯端末
US20130254553A1 (en) * 2012-03-24 2013-09-26 Paul L. Greene Digital data authentication and security system
JP6179328B2 (ja) * 2013-10-01 2017-08-16 富士ゼロックス株式会社 情報処理装置及び情報処理プログラム
JP6441742B2 (ja) * 2015-05-26 2018-12-19 日本電信電話株式会社 セキュリティレベル管理システム、セキュリティレベル管理装置、セキュリティレベル管理方法およびプログラム
US10505979B2 (en) * 2016-05-13 2019-12-10 International Business Machines Corporation Detection and warning of imposter web sites
US10855697B2 (en) * 2017-06-30 2020-12-01 Paypal, Inc. Threat intelligence system

Family Cites Families (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5438657A (en) * 1992-04-24 1995-08-01 Casio Computer Co., Ltd. Document processing apparatus for extracting a format from one document and using the extracted format to automatically edit another document
US6658151B2 (en) * 1999-04-08 2003-12-02 Ricoh Co., Ltd. Extracting information from symbolically compressed document images
GB0027280D0 (en) 2000-11-08 2000-12-27 Malcolm Peter An information management system
US7076527B2 (en) 2001-06-14 2006-07-11 Apple Computer, Inc. Method and apparatus for filtering email
JP2002373117A (ja) * 2001-06-15 2002-12-26 Justabeam:Kk 情報管理システム、画像データ出力装置、情報管理方法、およびプログラム
US20040080771A1 (en) * 2002-08-15 2004-04-29 Sachiko Mihira Image forming apparatus that can operate without wasteful use of resources thereof and unnecessary authentication
JP2004094401A (ja) 2002-08-29 2004-03-25 Ricoh Co Ltd セキュリティポリシー配布システム、セキュリティポリシーに基づき動作する装置、セキュリティポリシー配布方法、セキュリティポリシー配布プログラム、及びプログラムを記録した記録媒体
JP2004094405A (ja) 2002-08-29 2004-03-25 Ricoh Co Ltd セキュリティポリシー管理装置、セキュリティポリシー配布システム、セキュリティポリシー配布方法、セキュリティポリシー配布プログラム、及びプログラムを記録した記録媒体
JP2004102635A (ja) 2002-09-09 2004-04-02 Ricoh Co Ltd ユーザ認証方法、情報システム、文書保存装置及びデジタル複合機
JP2004102907A (ja) 2002-09-12 2004-04-02 Ricoh Co Ltd セキュリティポリシー記述方法、記録媒体、及び伝送装置
US20040125402A1 (en) * 2002-09-13 2004-07-01 Yoichi Kanai Document printing program, document protecting program, document protecting system, document printing apparatus for printing out a document based on security policy
US20040128555A1 (en) * 2002-09-19 2004-07-01 Atsuhisa Saitoh Image forming device controlling operation according to document security policy
CA2791794C (en) 2002-10-30 2017-01-10 Portauthority Technologies, Inc. A method and system for managing confidential information
JP2004164372A (ja) * 2002-11-14 2004-06-10 Nippon Telegr & Teleph Corp <Ntt> 共有データ蓄積配信装置及び共有データ蓄積配信方法及びプログラム及び該プログラムを記録した記録媒体
JP2004201069A (ja) * 2002-12-19 2004-07-15 Ricoh Co Ltd 画像処理装置、画像処理方法、画像処理プログラムおよび画像処理プログラムを記憶した記録媒体
WO2004066086A2 (en) * 2003-01-23 2004-08-05 Verdasys, Inc. Identifying similarities and history of modification within large collections of unstructured data
US7490116B2 (en) * 2003-01-23 2009-02-10 Verdasys, Inc. Identifying history of modification within large collections of unstructured data
GB2405229B (en) * 2003-08-19 2006-01-11 Sophos Plc Method and apparatus for filtering electronic mail
JP4704010B2 (ja) * 2003-11-14 2011-06-15 株式会社リコー 画像形成装置、画像形成システム、セキュリティ管理装置およびセキュリティ管理方法
JP4217146B2 (ja) * 2003-11-21 2009-01-28 株式会社リコー スキャナ装置、ビューア装置、画像保護方法、
EP1551146B1 (de) * 2004-01-05 2011-08-24 Ricoh Company, Ltd. Dokumentsicherheitsmanagement für wiederholt wiedergebbare Ausdrucke von elektronischen Dokumenten
US7594277B2 (en) * 2004-06-30 2009-09-22 Microsoft Corporation Method and system for detecting when an outgoing communication contains certain content

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
GOTTESFELD BROWN L.: "A SURVEY OF IMAGE REGISTRATION TECHNIQUES", ACM COMPUTING SURVEYS, ACM, NEW YORK, NY, US, US, vol. 24, no. 4, 1 December 1992 (1992-12-01), pages 325 - 376, XP002942558, ISSN: 0360-0300 *

Also Published As

Publication number Publication date
DE602005026249D1 (de) 2011-03-24
EP1675032A1 (de) 2006-06-28
JP2006185153A (ja) 2006-07-13
US20060168659A1 (en) 2006-07-27
JP4695388B2 (ja) 2011-06-08

Similar Documents

Publication Publication Date Title
EP1675032B1 (de) Vorrichtung, Verfahren und Computerprogrammprodukt zur Schätzung von Sicherheitsinformationen
JP4704010B2 (ja) 画像形成装置、画像形成システム、セキュリティ管理装置およびセキュリティ管理方法
US8976383B2 (en) Method and system for document printing management and control, and document source tracking
US7679767B2 (en) Printing system, printer, and program and method of controlling the printer
CN101742051B (zh) 信息处理装置和信息处理方法
US20080151288A1 (en) Document processing system, document processing instruction apparatus, computer readable recording medium storing document processing program, and computer data signal embodied in carrier wave
US20060047731A1 (en) Document-management device, document-management program, recording medium, and document-management method
JP4791776B2 (ja) セキュリティ情報推定装置、セキュリティ情報推定方法、セキュリティ情報推定プログラム及び記録媒体
CN101449277A (zh) 信息处理设备、信息处理方法和信息处理程序
US20090231615A1 (en) Job processing system, server apparatus, information processing apparatus, and job processing method
CN101312484B (zh) 图像处理设备和图像处理服务器
US7075668B2 (en) Direct printing from internet database
US8395792B2 (en) Image data processing apparatus connectable to a network
US9235722B2 (en) Document security
JP2008042636A (ja) 文書処理装置および文書処理システム、文書処理プログラム
US8218178B2 (en) Image processing apparatus, image processing method, recording medium storing image processing program, and computer data signal embedded in carrier wave
JP2007323579A (ja) 印刷制御プログラムおよび装置
JP4895696B2 (ja) 情報処理装置、情報処理方法及び情報処理プログラム
JP5145851B2 (ja) 文書管理システム、文書管理装置および文書管理プログラム
JP4852915B2 (ja) タイムスタンプ取得プログラム、画像形成装置及びデジタルデータ管理システム
CN101753765A (zh) 印刷系统
US8493457B2 (en) Managing device with recalculation, image formation processing system, computer readable medium storing program, and image forming method
JP4801368B2 (ja) 画像処理装置、画像処理方法、画像処理プログラム及び記録媒体
JP2006166432A (ja) 電子ドキュメントの証跡を監査するシステム、方法およびプログラム
JP2004280169A (ja) 画像処理装置の不正使用監視装置及びその不正使用監視装置の制御方法

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20060113

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LI LT LU LV MC NL PL PT RO SE SI SK TR

AX Request for extension of the european patent

Extension state: AL BA HR MK YU

17Q First examination report despatched

Effective date: 20070105

AKX Designation fees paid

Designated state(s): DE ES FR GB IT NL

GRAP Despatch of communication of intention to grant a patent

Free format text: ORIGINAL CODE: EPIDOSNIGR1

RTI1 Title (correction)

Free format text: A SECURITY INFORMATION ESTIMATING APPARATUS, A SECURITY INFORMATION ESTIMATING METHOD, AND A CORRESPONDING COMPUTER PROGRAM PRODUCT

GRAS Grant fee paid

Free format text: ORIGINAL CODE: EPIDOSNIGR3

GRAA (expected) grant

Free format text: ORIGINAL CODE: 0009210

AK Designated contracting states

Kind code of ref document: B1

Designated state(s): DE ES FR GB IT NL

REG Reference to a national code

Ref country code: GB

Ref legal event code: FG4D

REF Corresponds to:

Ref document number: 602005026249

Country of ref document: DE

Date of ref document: 20110324

Kind code of ref document: P

REG Reference to a national code

Ref country code: DE

Ref legal event code: R096

Ref document number: 602005026249

Country of ref document: DE

Effective date: 20110324

REG Reference to a national code

Ref country code: NL

Ref legal event code: VDEP

Effective date: 20110209

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: ES

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20110520

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: NL

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20110209

PLBE No opposition filed within time limit

Free format text: ORIGINAL CODE: 0009261

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT

26N No opposition filed

Effective date: 20111110

REG Reference to a national code

Ref country code: DE

Ref legal event code: R097

Ref document number: 602005026249

Country of ref document: DE

Effective date: 20111110

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: IT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20110209

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: DE

Payment date: 20141211

Year of fee payment: 10

Ref country code: GB

Payment date: 20141219

Year of fee payment: 10

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: FR

Payment date: 20141219

Year of fee payment: 10

REG Reference to a national code

Ref country code: DE

Ref legal event code: R119

Ref document number: 602005026249

Country of ref document: DE

GBPC Gb: european patent ceased through non-payment of renewal fee

Effective date: 20151223

REG Reference to a national code

Ref country code: FR

Ref legal event code: ST

Effective date: 20160831

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: DE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20160701

Ref country code: GB

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20151223

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: FR

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20151231